• Title/Summary/Keyword: 단일식별자

Search Result 22, Processing Time 0.033 seconds

Unique Feature Identifier for Utilizing Digital Map (수치지도의 활용을 위한 단일식별자)

  • Cho, Woo-Sug
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.6 no.1 s.11
    • /
    • pp.27-34
    • /
    • 1998
  • A Unique Feature Identifier(UFID) is a way of referring to a feature, generally representing a tangible feature in the real world. In other words, a UFID uniquely identifies the related feature in the database and is normally used to link two or more databases together. This paper presents a UFID system aiming at the internal uses for National Geography Institute(NGI) as well as external uses for National Geographic Information System(NGIS) generally to link datasets together. The advantage of the proposed type of UFID lies in the meaningful nature of the identifier in providing a direct spatial index - administrative area and feature code. The checksum character proposed in this research is designed to remove any uncertainty about the number being corrupt. It will account lot digit transposition during manual input as well as corruption in transfer or processing.

  • PDF

Design and Implementation of Efficient Unique Feature Identifier Management System (효율적인 지형지물 유일식별자 관리 시스템의 설계 및 구현)

  • 강혜영;황정래;김정자;이기준
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2004.03a
    • /
    • pp.17-22
    • /
    • 2004
  • 지형지물 유일식별자(UFID: Unique Feature Identifier)는 주민등록번호처럼 우리나라의 국토를 구성하고 있는 도로, 건물 및 하천 등의 모든 인공적 및 자연적 지형지물에 단일식별자를 부여함으로써 해당 지형지물을 관리하는 기관은 물론, 물류, 금융 등 각종 산업 분야에 매우 중요한 역할을 하게 된다. 따라서 본 논문에서는 국가기본지리정보에 지형지물 유일식별자를 생성 및 소멸, 검수 그리고 부여하는 방법을 제시하였다. 그리고, 국가기본지리정보를 위한 지형지물 유일식별자 관리시스템을 설계하고 구현하였으며, 서로 다른 두 데이터베이스간에 이루어지는 지형지물의 삽입, 삭제 그리고 갱신 등을 지형지물 유일식 별자를 통하여 연계하는 방안을 설계하여 제시하였다. 본 논문에서 제안한 시스템은 통신, 가스, 전략 등의 기관에 확대하여 적용이 가능할 것이다.

  • PDF

Processing of Multiple Regular Path Expressions using PID (경로 식별자를 이용한 다중 정규경로 처리기법)

  • Kim, Jong-Ik;Jeong, Tae-Seon;Kim, Hyeong-Ju
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.274-284
    • /
    • 2002
  • Queries on XML are based on paths in the data graph, which is represented as an edge labeled graph model. All proposed query languages for XML express queries using regular expressions to traverse arbitrary paths in the data graph. A meaningful query usually has several regular path expressions in it, but much of recent research is more concerned with optimizing a single path expression. In this paper, we present an efficient technique to process multiple path expressions in a query. We developed a data structure named as the path identifier(PID) to identify whether two given nodes lie on the fame path in the data graph or not, and utilized the PID for efficient processing of multiple path expressions. We implement our technique and present preliminary performance results.

Abnormal Sound Detection and Identification in Surveillance System (감시 시스템에서의 비정상 소리 탐지 및 식별)

  • Joo, Young-min;Lee, Eui-jong;Kim, Jeong-sik;Oh, Seung-geun;Park, Dai-hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.592-595
    • /
    • 2010
  • 본 논문에서는 감시카메라 환경에서 취득한 오디오 데이터를 입력으로 하여, 비정상 상황을 인식하는 시스템을 제안한다. 제안된 시스템은 단일클래스 SVM의 대표적인 모델인 SVDD와 최근 얼굴 인식 분야에서 성공적인 업적을 보여주고 있는 신호 처리 분야의 SRC를 계층적으로 결합한 구조로써, 첫 번째 계층에서는 SVDD로 비정상 소리를 신속하게 탐지하여 관리자에게 알람 경고하고, 두 번째 계층의 SRC는 탐지된 비정상 소리를 유형별로 세분화 식별하여 관리자에게 비상 상황을 보고함으로써 관리자의 위기 상황 대처를 돕는다. 제안된 시스템은 실시간 처리가 가능하며, 점증적 갱신의 학습 능력으로 인하여 비정상 오디오 데이터베이스의 변화에도 능동적으로 적응할 수 있다. 실험을 통하여 제안된 시스템의 성능을 검증한다.

Multi-Path Index Scheme for the Efficient Retrieval of XML Data (XML 데이타의 효과적인 검색을 이한 다중 경로 인덱스)

  • Song, Ha-Joo;Kim, Hyoung-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.12-23
    • /
    • 2001
  • Extended path expressions are used to denote multiple paths concisely by using '$\ast$' character. They are convenient for expressing OQL queries to retrieve XML data stored in OODBs. In this paper, we propose a multi-path index scheme as a new index scheme to efficiently process queries with extended path expressions. Our proposed index scheme allocates a unique path identifier for every possible single path in an extended path expression and provides functionalities of both a single path indexing and multiple path indexing through the composition of index key and path identifier while using only a index structure. The proposed index scheme provides better performance than single-path index schemes, and is practical since it can be implemented by little modification of leaf records of a B+-tree index.

  • PDF

A Study on the Conceptual Design of Integrated Management System for Public SW Project Information (공공 소프트웨어(SW) 사업정보 통합 관리체계의 개념적 설계에 관한 연구)

  • Shin, Kitae;Park, Chankwon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.199-216
    • /
    • 2019
  • The public SW market is 3 trillion won, which is less than 10% of the total SW market. However, due to the nature of the domestic market, it is an important market with a relatively large impact on small and medium-sized software companies. In this market, government is operating the Public SW Project Demand Forecasting System in order to support the marketing activities of small and medium sized SW companies and establish a fair market order. The current system has limitations such as lack of user convenience, insufficient analysis capability and less business connection. This study was conducted to identify the problems of these systems and to propose a new system for improving the convenience of users and expanding the information utilization of SMEs. To this end, we analyzed the requirements of each stakeholder. We proposed the 2-phased forecasting cycle, the management cycle, and the system life cycle of public SW projects and created a unified identifier (UID) so that the information of those projects can be identified and linked among them. As a result, an integrated reference model of project information management based on system life cycle was developed, which can explain the demand forecasting and project information, and the improved processes was also designed to implement them. Through the result of this study, it is expected that integrated management of public SW projects will be possible.

A Study on Modeling the Managed Object for Object-oriented Subscriber Network Management System (객체지향의 가입자 망관리 시스템을 위한 관리객체 모델링에 대한 연구)

  • Yun, Byeong-Soo;Kim, Che-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.899-902
    • /
    • 2003
  • 다양한 형태로 이루어진 가입자 망은 접속방식별로 이기종(異機種)의 장비를 이용하여 가입자에게 단일 형태의 초고속 인터넷 서비스를 제공하고 있다. 전국에 분산된 가입자 망을 효과적이며 집중화된 형태로 관리하기 위해서 다양한 형태의 접속방식을 지원하는 이기종 장비 및 단말들의 상위 개념으로서 추상적이며 논리적인 객체 관리모델이 필요하다. 본 논문은 RM-ODP를 이용하여 통합된 계층적 망관리를 가능하게 하는 인터넷 가입자 망에 대한 모델링 구조를 제시하였다.

  • PDF

Improved Two-Party ID-Based Authenticated Key Agreement Protocol (개선된 두 참여자간 식별자 기반 인증된 키 동의 프로토콜)

  • Vallent, Thokozani Felix;Kim, Hae-Jung;Yoon, Eun-Jun;Kim, Hyunsung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.595-604
    • /
    • 2013
  • Devising a secure authenticated key agreement (AKA) protocol for two entities communicating over an open network is a matter of current research. McCullagh et al. proposed a new two-party identity-based AKA protocol supporting both key escrow and key escrow-less property instantiated by either in a single domain or over two distinct domains. In this paper, we show that their protocol over two distinct domains suffers from masquerading attack and therefore does not satisfy the claimed security. The attack is made possible due to the lack of sufficient authentication of entity and integrity assurance in the protocol. We then propose an efficient verifiable key agreement protocol by including signature primitive in the authentication procedure to solve the problem of McCullagh et al.'s protocol.

A Study on Batch Auditing with Identification of Corrupted Cloud Storage in Multi-Cloud Environments (손상 클라우드 식별 가능한 다중 클라우드 일괄 감사 기법에 관한 연구)

  • Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.75-82
    • /
    • 2015
  • Recently, many public auditing schemes have been proposed to support public auditability that enables a third party auditor to verify the integrity of data stored in the remote cloud server. To improve the performance of the auditor, several public auditing schemes support batch auditing which allows the auditor to handle simultaneously multiple auditing delegations from different users. However, when even one data is corrupted, the batch auditing will fail and individual and repeated auditing processes will be required. It is difficult to identify the corrupted data from the proof in which distinct data blocks and authenticators of distinct users are intricately aggregated. In this paper, we extend a public auditing scheme of Wang et al. to support batch auditing for multi-cloud and multi-user. We propose an identification scheme of the corrupted cloud when the data of a single cloud is corrupted in the batch auditing of multi-cloud and multi-user.

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks (IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.237-242
    • /
    • 2018
  • Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.